Detecting communities of common behaviors, interests, and interactions in social networks is essential to model a network's structure. Overlapping community detection is an NP-Hard problem. Several solutions have been proposed; however, most of these techniques are computationally expensive. We have developed a fast-hierarchical algorithm using the notion of segmentation by weighted aggregation. Experimental results on synthetic and real benchmark networks show that the proposed algorithm effectively finds communities (Clusters) with varied overlap and non-exhaustiveness structures. Our method outperforms the state-of-the-art hierarchical clustering algorithms measured by the F-measure and the computational time.
{"title":"Detecting Overlapping Communities in Social Networks Using A Modified Segmentation by Weighted Aggregation Approach","authors":"R. Kashef","doi":"10.1145/3460620.3460632","DOIUrl":"https://doi.org/10.1145/3460620.3460632","url":null,"abstract":"Detecting communities of common behaviors, interests, and interactions in social networks is essential to model a network's structure. Overlapping community detection is an NP-Hard problem. Several solutions have been proposed; however, most of these techniques are computationally expensive. We have developed a fast-hierarchical algorithm using the notion of segmentation by weighted aggregation. Experimental results on synthetic and real benchmark networks show that the proposed algorithm effectively finds communities (Clusters) with varied overlap and non-exhaustiveness structures. Our method outperforms the state-of-the-art hierarchical clustering algorithms measured by the F-measure and the computational time.","PeriodicalId":36824,"journal":{"name":"Data","volume":"40 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78689319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Internet of things (IoT) is a new technology that shapes the future of a world that is rapidly being invaded by smart devices connected to the Internet. Such technology has a great role in developing the idea of a smart city. A smart city is a city that takes advantage of existing infrastructure and integrates it with the Internet of things technology to improve the quality of life. Internet of Things (IoT) sensors are distributed geographically around the city to collect data from the environment (i.e.: streets, cars, traffic lights...etc.), process, and manage it to provide intelligent actionable information to citizens. All data transferred through networks of a smart city may be threatened and susceptible to illegal actions such as violation, stealing, and inappropriate use. These security threats affect the privacy and security of users; where hackers can get access to user's data and gain control of their smart homes, cars, medical devices and might even gain control over city traffic lights. All the above enforce the need to have a security system that continuously monitors and tracks all data logs to detect any suspicious activity. In this paper, we propose a Security Information and Event Management (SIEM) approach for smart cities by forwarding event logs generated by smart devices to a security operation center that works around the clock to detect security incidents and handle them. Such an approach aims to create a safe smart living environment.
{"title":"SIEM Architecture for the Internet of Things and Smart City","authors":"Abdalrahman Hwoij, As'har Khamaiseh, M. Ababneh","doi":"10.1145/3460620.3460747","DOIUrl":"https://doi.org/10.1145/3460620.3460747","url":null,"abstract":"The Internet of things (IoT) is a new technology that shapes the future of a world that is rapidly being invaded by smart devices connected to the Internet. Such technology has a great role in developing the idea of a smart city. A smart city is a city that takes advantage of existing infrastructure and integrates it with the Internet of things technology to improve the quality of life. Internet of Things (IoT) sensors are distributed geographically around the city to collect data from the environment (i.e.: streets, cars, traffic lights...etc.), process, and manage it to provide intelligent actionable information to citizens. All data transferred through networks of a smart city may be threatened and susceptible to illegal actions such as violation, stealing, and inappropriate use. These security threats affect the privacy and security of users; where hackers can get access to user's data and gain control of their smart homes, cars, medical devices and might even gain control over city traffic lights. All the above enforce the need to have a security system that continuously monitors and tracks all data logs to detect any suspicious activity. In this paper, we propose a Security Information and Event Management (SIEM) approach for smart cities by forwarding event logs generated by smart devices to a security operation center that works around the clock to detect security incidents and handle them. Such an approach aims to create a safe smart living environment.","PeriodicalId":36824,"journal":{"name":"Data","volume":"29 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74942194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The mechanism underlying the complex behavior of major or clinical depression has been hypothesized as a dynamical system. This study presents an analysis of mood self-assessment in major depression using the method of fuzzy cross recurrence plots and tensor decomposition. The relationships between positive and negative mental states can be visualized and quantified using the proposed approach. The discovery of cross recurrences or dynamic correlations of the two opposite mental states can be helpful for targeted therapy in the management of personalized depression either under or without antidepressant drugs.
{"title":"Fuzzy Cross Recurrence Analysis and Tensor Decomposition of Major-Depression Time-Series Data","authors":"T. Pham, F. Y. A. Anezi","doi":"10.1145/3460620.3460626","DOIUrl":"https://doi.org/10.1145/3460620.3460626","url":null,"abstract":"The mechanism underlying the complex behavior of major or clinical depression has been hypothesized as a dynamical system. This study presents an analysis of mood self-assessment in major depression using the method of fuzzy cross recurrence plots and tensor decomposition. The relationships between positive and negative mental states can be visualized and quantified using the proposed approach. The discovery of cross recurrences or dynamic correlations of the two opposite mental states can be helpful for targeted therapy in the management of personalized depression either under or without antidepressant drugs.","PeriodicalId":36824,"journal":{"name":"Data","volume":"81 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75654832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Machine learning and statistics are categorized as part of data science. Regression is one of the techniques of machine learning. Most of the contributions in the literature in respect to intrusion detection are mainly based on dimensionality reduction using techniques such as PCA, SVD, feature selection, feature reduction techniques and application of classifier algorithms. Very less attention is paid on regression analysis for intrusion detection in the existing literature. There is a scope to apply regression-based analysis for intrusion detection. Regression analysis may be applied for dimensionality reduction, classification or prediction tasks. This paper throws light on the possibility of applying regression analysis for intrusion detection and outlines some of the contributions that addressed regression analysis to perform intrusion detection.
{"title":"Regression analysis for network intrusion detection","authors":"Arun Nagaraja, U. Boregowda, V. Radhakrishna","doi":"10.1145/3460620.3460751","DOIUrl":"https://doi.org/10.1145/3460620.3460751","url":null,"abstract":"Machine learning and statistics are categorized as part of data science. Regression is one of the techniques of machine learning. Most of the contributions in the literature in respect to intrusion detection are mainly based on dimensionality reduction using techniques such as PCA, SVD, feature selection, feature reduction techniques and application of classifier algorithms. Very less attention is paid on regression analysis for intrusion detection in the existing literature. There is a scope to apply regression-based analysis for intrusion detection. Regression analysis may be applied for dimensionality reduction, classification or prediction tasks. This paper throws light on the possibility of applying regression analysis for intrusion detection and outlines some of the contributions that addressed regression analysis to perform intrusion detection.","PeriodicalId":36824,"journal":{"name":"Data","volume":"15 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77914301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Bekmanova, Ye.A. Ongarbayev, Baubek Somzhurek, Nurlan Mukatayev
The proposed model for organizing blended and distance learning involves the creation of an individual learning path, which makes it flexible. The learning model is represented using an ontological model, and the decision rules for the model are logical rules. This training model is used to train teachers in digital literacy and distance learning in the context of Covid 19
{"title":"Intelligent learning systems for LLL courses: Intelligent learning systems for LLL courses","authors":"G. Bekmanova, Ye.A. Ongarbayev, Baubek Somzhurek, Nurlan Mukatayev","doi":"10.1145/3460620.3460625","DOIUrl":"https://doi.org/10.1145/3460620.3460625","url":null,"abstract":"The proposed model for organizing blended and distance learning involves the creation of an individual learning path, which makes it flexible. The learning model is represented using an ontological model, and the decision rules for the model are logical rules. This training model is used to train teachers in digital literacy and distance learning in the context of Covid 19","PeriodicalId":36824,"journal":{"name":"Data","volume":"70 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73835613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Smartphones are multi-purpose and widely used devices in various fields, in terms of personal use, and companies and governments. Increasing dependence on them opened the way for increased violations on its users, as it became a fat substance for criminals, for their illegal practices, so it encountered serious and targeted security threats. This paper presents a set of rules and controls that will reduce the risks that threaten smartphone users. Furthermore, this work provides the methods of risk assessment that are related to smartphones. It identifies the assets and lists several different threats that are relevant. Each risk has its impact on the assets, this is described by mapping it with the likelihood of each threat.
{"title":"Risk Assessment in Smartphones: Comprehensive Analysis","authors":"Mohammed Nasereddin, A. Qusef","doi":"10.1145/3460620.3460737","DOIUrl":"https://doi.org/10.1145/3460620.3460737","url":null,"abstract":"Smartphones are multi-purpose and widely used devices in various fields, in terms of personal use, and companies and governments. Increasing dependence on them opened the way for increased violations on its users, as it became a fat substance for criminals, for their illegal practices, so it encountered serious and targeted security threats. This paper presents a set of rules and controls that will reduce the risks that threaten smartphone users. Furthermore, this work provides the methods of risk assessment that are related to smartphones. It identifies the assets and lists several different threats that are relevant. Each risk has its impact on the assets, this is described by mapping it with the likelihood of each threat.","PeriodicalId":36824,"journal":{"name":"Data","volume":"81 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76269303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Salma F. Elharish, I. Denna, Abdelsalam M. Maatuk, Ebitisam K. Elberkawi
Electronic Health Records (EHRs) is one of many enlargements in health informatics. It is a computerized system to collect, store, and display patient information. Although with the many benefits, many barriers affect the implementation of these systems. Such barriers can be technical, financial, organizational, individual, or even legal. This study aims to identify the important barriers associated with the implementation of EHR in polyclinics and to measure the perception of healthcare staff and their knowledge about this system. A self-prepared modified questionnaire and 100 participants were involved in this study. The questionnaire was composed of three sections: section (A) was concerned with demographic data, Section (B) was related to the knowledge/attitude and the candidates' perception towards EHR, and whereas Section (C) was focused on the practical implementation of the e-health record such as what volunteer's perception about the benefits and concerns of the implementation of the system. There were different opinions, views, and perceptions among the health care staff who participated in the study. However, there is a general agreement among all participants to the factors that delay the implementation of the EHRs system in Libya. The results show a high cost of adopting EHRs, lack of experience with the use of computers, security concerns regarding the use of EHR systems, resistance to change and adopt new technology to be significant barriers when it comes to EHRs implementation and adoption.
电子健康档案(Electronic Health Records, EHRs)是健康信息学的众多扩展之一。它是一个计算机系统,用于收集、存储和显示患者信息。虽然有很多好处,但也有很多障碍影响着这些系统的实施。这些障碍可以是技术上的、财务上的、组织上的、个人的,甚至是法律上的。本研究旨在确定与在综合诊所实施电子健康档案相关的重要障碍,并测量医护人员对该系统的认知及其知识。本研究采用自行编制的修正问卷对100名被试进行调查。问卷由三部分组成:第(A)部分涉及人口统计数据,第(B)部分涉及知识/态度和候选人对电子健康档案的看法,而第(C)部分侧重于电子健康档案的实际实施,例如志愿者对实施该系统的好处和关注点的看法。参与研究的医护人员有不同的意见、观点和看法。然而,所有参与者对延迟利比亚实施电子病历系统的因素达成了普遍共识。结果显示,采用电子病历的成本高,缺乏使用计算机的经验,使用电子病历系统的安全问题,抵制改变和采用新技术是实施和采用电子病历的重大障碍。
{"title":"Application of Electronic Health Records in Polyclinics: Barriers & Benefits","authors":"Salma F. Elharish, I. Denna, Abdelsalam M. Maatuk, Ebitisam K. Elberkawi","doi":"10.1145/3460620.3460628","DOIUrl":"https://doi.org/10.1145/3460620.3460628","url":null,"abstract":"Electronic Health Records (EHRs) is one of many enlargements in health informatics. It is a computerized system to collect, store, and display patient information. Although with the many benefits, many barriers affect the implementation of these systems. Such barriers can be technical, financial, organizational, individual, or even legal. This study aims to identify the important barriers associated with the implementation of EHR in polyclinics and to measure the perception of healthcare staff and their knowledge about this system. A self-prepared modified questionnaire and 100 participants were involved in this study. The questionnaire was composed of three sections: section (A) was concerned with demographic data, Section (B) was related to the knowledge/attitude and the candidates' perception towards EHR, and whereas Section (C) was focused on the practical implementation of the e-health record such as what volunteer's perception about the benefits and concerns of the implementation of the system. There were different opinions, views, and perceptions among the health care staff who participated in the study. However, there is a general agreement among all participants to the factors that delay the implementation of the EHRs system in Libya. The results show a high cost of adopting EHRs, lack of experience with the use of computers, security concerns regarding the use of EHR systems, resistance to change and adopt new technology to be significant barriers when it comes to EHRs implementation and adoption.","PeriodicalId":36824,"journal":{"name":"Data","volume":"143 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86186730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. B. Yassein, Ismail Hmeidi, Fatimah Alghazo, Bayan Odat, Ayat Smairat
Internet of Things is a connection of associated objects wherein theseobjects can gather information and interchange them utilizing sensors. IoT allowsconnecting objects and property as one unit, enables us to control everything we want,and tells us of the state of things, whether it is replacing or no. In the coming times,the world is adapting to apply the Internet of things in several major fields, among themost important domains that can integrate into it are industries, companies, healthcare, and communications. The inserted sensors of associated gadgets play out asignificant job and it has restricted energy abilities, many techniques studied theproblem of restricted energy. This works center around Application Layer methodsand explicitly on one of the main conventions, the Constrained Application Protocol(CoAP). We examine the most reasonable energy-effective procedures to actualizethe CoAP, and finally, we compare these techniques on different levels.
{"title":"Energy Saving Techniques in CoAP of Internet of Things","authors":"M. B. Yassein, Ismail Hmeidi, Fatimah Alghazo, Bayan Odat, Ayat Smairat","doi":"10.1145/3460620.3460743","DOIUrl":"https://doi.org/10.1145/3460620.3460743","url":null,"abstract":"Internet of Things is a connection of associated objects wherein theseobjects can gather information and interchange them utilizing sensors. IoT allowsconnecting objects and property as one unit, enables us to control everything we want,and tells us of the state of things, whether it is replacing or no. In the coming times,the world is adapting to apply the Internet of things in several major fields, among themost important domains that can integrate into it are industries, companies, healthcare, and communications. The inserted sensors of associated gadgets play out asignificant job and it has restricted energy abilities, many techniques studied theproblem of restricted energy. This works center around Application Layer methodsand explicitly on one of the main conventions, the Constrained Application Protocol(CoAP). We examine the most reasonable energy-effective procedures to actualizethe CoAP, and finally, we compare these techniques on different levels.","PeriodicalId":36824,"journal":{"name":"Data","volume":"15 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85931267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Since the last decade, the number of Internet of Things (IoT) devices has increased dramatically. Consequently, the number of effected users and persons has also grown. By 2025 the number of connected IoT devices will reach 75.44 billion. This tremendous increase in IoT devices environments has increased the IoT threats, risks, and digital crimes. Thus, an efficient IoT forensic model should be laid out to fulfill the investigation requirements in IoT environments. In this paper, a new IoT forensics model has been introduced to face the IoT forensics challenges. The proposed model has satisfied the security, confidentiality, integrity, availability, authentication, and non-repudiation requirements.
{"title":"An Internet Of Things (IoT) Forensics Model Using Third-Party Logs-Vault","authors":"Ahmed Hambouz, Yousef Shaheen, M. Ababneh","doi":"10.1145/3460620.3460746","DOIUrl":"https://doi.org/10.1145/3460620.3460746","url":null,"abstract":"Since the last decade, the number of Internet of Things (IoT) devices has increased dramatically. Consequently, the number of effected users and persons has also grown. By 2025 the number of connected IoT devices will reach 75.44 billion. This tremendous increase in IoT devices environments has increased the IoT threats, risks, and digital crimes. Thus, an efficient IoT forensic model should be laid out to fulfill the investigation requirements in IoT environments. In this paper, a new IoT forensics model has been introduced to face the IoT forensics challenges. The proposed model has satisfied the security, confidentiality, integrity, availability, authentication, and non-repudiation requirements.","PeriodicalId":36824,"journal":{"name":"Data","volume":"13 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85615102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Agency of Digital Development (ADD) is a strategic public entity placed under the supervision of the Ministry in charge of the Digital Economy. It has legal personality and financial autonomy and was created under Law No 61-16 published in the official bulletin dated August 30, 2017. ADD is an institutional actor responsible for implementing the State’s strategy for digital development and promoting the dissemination of digital tools and the development of their use among citizens. Indeed, ADD has a note of general guidelines for the digital development in Morocco by 2025; this note refers to three strategic axes.
{"title":"Digital transformation in Morocco by 2025: How ADD is catalysing this transformation?","authors":"Ismail Mhamdi, Hafid Barka","doi":"10.1145/3460620.3460762","DOIUrl":"https://doi.org/10.1145/3460620.3460762","url":null,"abstract":"The Agency of Digital Development (ADD) is a strategic public entity placed under the supervision of the Ministry in charge of the Digital Economy. It has legal personality and financial autonomy and was created under Law No 61-16 published in the official bulletin dated August 30, 2017. ADD is an institutional actor responsible for implementing the State’s strategy for digital development and promoting the dissemination of digital tools and the development of their use among citizens. Indeed, ADD has a note of general guidelines for the digital development in Morocco by 2025; this note refers to three strategic axes.","PeriodicalId":36824,"journal":{"name":"Data","volume":"14 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2021-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78428163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}